{"id":"https://openalex.org/W4229076054","doi":"https://doi.org/10.1145/3507657.3528539","title":"Take a Bite of the Reality Sandwich","display_name":"Take a Bite of the Reality Sandwich","publication_year":2022,"publication_date":"2022-05-07","ids":{"openalex":"https://openalex.org/W4229076054","doi":"https://doi.org/10.1145/3507657.3528539"},"language":"en","primary_location":{"id":"doi:10.1145/3507657.3528539","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3507657.3528539","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3507657.3528539","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks","raw_type":"proceedings-article"},"type":"preprint","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3507657.3528539","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5008835720","display_name":"Eric Wagner","orcid":"https://orcid.org/0000-0003-3211-1015"},"institutions":[{"id":"https://openalex.org/I4210166245","display_name":"Fraunhofer Institute for Communication, Information Processing and Ergonomics","ror":"https://ror.org/05nn0gw40","country_code":"DE","type":"facility","lineage":["https://openalex.org/I4210166245","https://openalex.org/I4923324"]},{"id":"https://openalex.org/I887968799","display_name":"RWTH Aachen University","ror":"https://ror.org/04xfq0f34","country_code":"DE","type":"education","lineage":["https://openalex.org/I887968799"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Eric Wagner","raw_affiliation_strings":["Fraunhofer FKIE &amp; RWTH Aachen University, Wachtberg, Germany"],"affiliations":[{"raw_affiliation_string":"Fraunhofer FKIE &amp; RWTH Aachen University, Wachtberg, Germany","institution_ids":["https://openalex.org/I887968799","https://openalex.org/I4210166245"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5067641190","display_name":"Jan Bauer","orcid":"https://orcid.org/0000-0001-7631-6456"},"institutions":[{"id":"https://openalex.org/I4210166245","display_name":"Fraunhofer Institute for Communication, Information Processing and Ergonomics","ror":"https://ror.org/05nn0gw40","country_code":"DE","type":"facility","lineage":["https://openalex.org/I4210166245","https://openalex.org/I4923324"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Jan Bauer","raw_affiliation_strings":["Fraunhofer FKIE, Wachtberg, Germany"],"affiliations":[{"raw_affiliation_string":"Fraunhofer FKIE, Wachtberg, Germany","institution_ids":["https://openalex.org/I4210166245"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5063048519","display_name":"Martin Henze","orcid":"https://orcid.org/0000-0001-8717-2523"},"institutions":[{"id":"https://openalex.org/I887968799","display_name":"RWTH Aachen University","ror":"https://ror.org/04xfq0f34","country_code":"DE","type":"education","lineage":["https://openalex.org/I887968799"]},{"id":"https://openalex.org/I4210166245","display_name":"Fraunhofer Institute for Communication, Information Processing and Ergonomics","ror":"https://ror.org/05nn0gw40","country_code":"DE","type":"facility","lineage":["https://openalex.org/I4210166245","https://openalex.org/I4923324"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Martin Henze","raw_affiliation_strings":["RWTH Aachen University &amp; Fraunhofer FKIE, Aachen, Germany"],"affiliations":[{"raw_affiliation_string":"RWTH Aachen University &amp; Fraunhofer FKIE, Aachen, Germany","institution_ids":["https://openalex.org/I887968799","https://openalex.org/I4210166245"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5008835720"],"corresponding_institution_ids":["https://openalex.org/I4210166245","https://openalex.org/I887968799"],"apc_list":null,"apc_paid":null,"fwci":2.1405,"has_fulltext":true,"cited_by_count":17,"citation_normalized_percentile":{"value":0.875,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"207","last_page":"221"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9972000122070312,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8141782283782959},{"id":"https://openalex.org/keywords/message-authentication-code","display_name":"Message authentication code","score":0.768149733543396},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.7042374014854431},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.6632300615310669},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.6555912494659424},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.509131133556366},{"id":"https://openalex.org/keywords/resilience","display_name":"Resilience (materials science)","score":0.48093146085739136},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.4244953989982605},{"id":"https://openalex.org/keywords/parameterized-complexity","display_name":"Parameterized complexity","score":0.41366705298423767},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.2576218843460083},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.09050768613815308}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8141782283782959},{"id":"https://openalex.org/C141492731","wikidata":"https://www.wikidata.org/wiki/Q1052621","display_name":"Message authentication code","level":3,"score":0.768149733543396},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.7042374014854431},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.6632300615310669},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.6555912494659424},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.509131133556366},{"id":"https://openalex.org/C2779585090","wikidata":"https://www.wikidata.org/wiki/Q3457762","display_name":"Resilience (materials science)","level":2,"score":0.48093146085739136},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.4244953989982605},{"id":"https://openalex.org/C165464430","wikidata":"https://www.wikidata.org/wiki/Q1570441","display_name":"Parameterized complexity","level":2,"score":0.41366705298423767},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.2576218843460083},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.09050768613815308},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C97355855","wikidata":"https://www.wikidata.org/wiki/Q11473","display_name":"Thermodynamics","level":1,"score":0.0},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3507657.3528539","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3507657.3528539","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3507657.3528539","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3507657.3528539","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3507657.3528539","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3507657.3528539","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks","raw_type":"proceedings-article"},"sustainable_development_goals":[{"score":0.5099999904632568,"display_name":"No poverty","id":"https://metadata.un.org/sdg/1"}],"awards":[{"id":"https://openalex.org/G2899823199","display_name":null,"funder_award_id":"90621612","funder_id":"https://openalex.org/F4320320879","funder_display_name":"Deutsche Forschungsgemeinschaft"},{"id":"https://openalex.org/G5106512922","display_name":null,"funder_award_id":"Deutsche Forschungsgemeinschaft (DFG","funder_id":"https://openalex.org/F4320320879","funder_display_name":"Deutsche Forschungsgemeinschaft"},{"id":"https://openalex.org/G5814583085","display_name":null,"funder_award_id":"39062161","funder_id":"https://openalex.org/F4320320879","funder_display_name":"Deutsche Forschungsgemeinschaft"},{"id":"https://openalex.org/G69884316","display_name":null,"funder_award_id":"EXC-2023","funder_id":"https://openalex.org/F4320320879","funder_display_name":"Deutsche Forschungsgemeinschaft"},{"id":"https://openalex.org/G7300938430","display_name":null,"funder_award_id":"390621612","funder_id":"https://openalex.org/F4320320879","funder_display_name":"Deutsche Forschungsgemeinschaft"}],"funders":[{"id":"https://openalex.org/F4320320879","display_name":"Deutsche Forschungsgemeinschaft","ror":"https://ror.org/018mejw64"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4229076054.pdf","grobid_xml":"https://content.openalex.org/works/W4229076054.grobid-xml"},"referenced_works_count":74,"referenced_works":["https://openalex.org/W185923122","https://openalex.org/W1274009853","https://openalex.org/W1479727008","https://openalex.org/W1544856668","https://openalex.org/W1581698685","https://openalex.org/W1597973956","https://openalex.org/W1633529777","https://openalex.org/W1762017652","https://openalex.org/W1965994418","https://openalex.org/W1970412479","https://openalex.org/W1983829615","https://openalex.org/W2021268118","https://openalex.org/W2036269332","https://openalex.org/W2061285874","https://openalex.org/W2072724180","https://openalex.org/W2086174184","https://openalex.org/W2099817583","https://openalex.org/W2102495876","https://openalex.org/W2106379470","https://openalex.org/W2107165730","https://openalex.org/W2109116994","https://openalex.org/W2111035403","https://openalex.org/W2125555950","https://openalex.org/W2125880338","https://openalex.org/W2128395674","https://openalex.org/W2130459259","https://openalex.org/W2131300413","https://openalex.org/W2134615993","https://openalex.org/W2135825595","https://openalex.org/W2138122413","https://openalex.org/W2141610814","https://openalex.org/W2149254819","https://openalex.org/W2166668397","https://openalex.org/W2167569963","https://openalex.org/W2182132145","https://openalex.org/W2290174367","https://openalex.org/W2324447404","https://openalex.org/W2399266824","https://openalex.org/W2480541030","https://openalex.org/W2520418590","https://openalex.org/W2524044976","https://openalex.org/W2567113185","https://openalex.org/W2601019677","https://openalex.org/W2621530037","https://openalex.org/W2701138980","https://openalex.org/W2732616350","https://openalex.org/W2735858160","https://openalex.org/W2744401752","https://openalex.org/W2751335236","https://openalex.org/W2768417459","https://openalex.org/W2772033649","https://openalex.org/W2806902889","https://openalex.org/W2807286454","https://openalex.org/W2891126454","https://openalex.org/W2891250288","https://openalex.org/W2913632136","https://openalex.org/W2914646192","https://openalex.org/W2928143941","https://openalex.org/W2963804058","https://openalex.org/W2972765956","https://openalex.org/W2981970634","https://openalex.org/W2982542479","https://openalex.org/W2997154460","https://openalex.org/W3008134592","https://openalex.org/W3046019477","https://openalex.org/W3048297068","https://openalex.org/W3105745143","https://openalex.org/W3108773240","https://openalex.org/W3155946113","https://openalex.org/W3164513951","https://openalex.org/W3179838906","https://openalex.org/W4205948809","https://openalex.org/W4228996939","https://openalex.org/W4250470633"],"related_works":["https://openalex.org/W2166668397","https://openalex.org/W2116285675","https://openalex.org/W1533309011","https://openalex.org/W3048245612","https://openalex.org/W1980599209","https://openalex.org/W4220718301","https://openalex.org/W1555715488","https://openalex.org/W1991172351","https://openalex.org/W1510656496","https://openalex.org/W2061637199"],"abstract_inverted_index":{"Message":[0],"authentication":[1,17,36,84,108,138,182],"guarantees":[2,65,131],"the":[3,63,112,134],"integrity":[4,40,68],"of":[5,66,115,136],"messages":[6,48,60],"exchanged":[7],"over":[8],"untrusted":[9],"channels.":[10],"However,":[11,70],"to":[12,46,61,72,89,105,132,146,166],"achieve":[13],"this":[14,32,78,119],"goal,":[15],"message":[16,35,83,181],"considerably":[18],"expands":[19],"packet":[20,90,140],"sizes,":[21],"which":[22,124,152],"is":[23,43,54,164],"especially":[24],"problematic":[25],"in":[26,77],"constrained":[27],"wireless":[28],"environments.":[29],"To":[30,118,142],"address":[31],"issue,":[33],"progressive":[34,82,137,180],"provides":[37],"initially":[38],"reduced":[39,52],"protection":[41],"that":[42,80,162],"often":[44],"sufficient":[45],"process":[47],"upon":[49],"reception.":[50],"This":[51],"security":[53,130],"then":[55],"successively":[56],"improved":[57],"with":[58,128],"subsequent":[59],"uphold":[62],"strong":[64],"traditional":[67],"protection.":[69],"contrary":[71],"previous":[73],"claims,":[74],"we":[75,101,121,149],"show":[76],"paper":[79],"existing":[81],"schemes":[85],"are":[86],"highly":[87],"susceptible":[88],"loss":[91],"induced":[92],"by":[93],"poor":[94],"channel":[95],"conditions":[96],"or":[97],"jamming":[98],"attacks.":[99],"Thus,":[100],"consider":[102],"it":[103],"imperative":[104],"rethink":[106],"how":[107],"tags":[109],"depend":[110],"on":[111],"successful":[113],"reception":[114],"surrounding":[116],"packets.":[117],"end,":[120],"propose":[122],"R2-D2,":[123],"uses":[125],"randomized":[126],"dependencies":[127],"parameterized":[129],"increase":[133],"resilience":[135],"against":[139],"loss.":[141],"deploy":[143],"our":[144],"approach":[145],"resource-constrained":[147],"devices,":[148],"introduce":[150],"SP-MAC,":[151],"implements":[153],"R2-D2":[154],"using":[155],"efficient":[156],"XOR":[157],"operations.":[158],"Our":[159],"evaluation":[160],"shows":[161],"SP-MAC":[163],"resilient":[165],"sophisticated":[167],"network-level":[168],"attacks":[169],"and":[170,174],"operates":[171],"as":[172,176],"resources-conscious":[173],"fast":[175],"existing,":[177],"yet":[178],"insecure,":[179],"schemes.":[183]},"counts_by_year":[{"year":2025,"cited_by_count":5},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":5},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":2}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2022-05-08T00:00:00"}
